Search Header Logo

Security+ Day 10

Authored by Nina Rosario

Computers

Professional Development

Used 1+ times

Security+ Day 10
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes a situation where your organization points you to approved mobile device manufacturers for work use?

BYOD

COBO

COPE

CYOD

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company is adopting a BYOD policy and is looking for a comprehensive solution to protect company information on user devices. Which of the following solutions

would BEST support the policy?

Mobile device management

Full-device encryption

Remote wipe

Biometrics

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization has implemented a policy requiring the use of conductive metal lockboxes for personal electronic devices outside of a secure research lab. Which of the following did the organization determine to be the GREATEST risk to intellectual property when creating this policy?

The theft of portable electronic devices

Geotagging in the metadata of images

Bluesnarfing of mobile devices

Data exfiltration over a mobile hotspot

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What protocol uses port 69?

DHCP

Telnet

TFTP

SMB

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What port number would you need to Allow on your firewall for DNS queries?

53

68

389

25

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?